Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 10 out of 15 pages
Viewing questions 136-150 out of questions
Questions # 136:

When is it appropriate to use computer forensics?

Options:

A.

If copyright and intellectual property theft/misuse has occurred


B.

If employees do not care for their boss management techniques


C.

If sales drop off for no apparent reason for an extended period of time


D.

If a financial institution is burglarized by robbers


Expert Solution
Questions # 137:

A forensics investigator needs to copy data from a computer to some type of removable media so he can examine the information at another location. The problem is that the data is around 42GB in size. What type of removable media could the investigator use?

Options:

A.

Blu-Ray single-layer


B.

HD-DVD


C.

Blu-Ray dual-layer


D.

DVD-18


Expert Solution
Questions # 138:

Watson, a forensic investigator, is examining a copy of an ISO file stored in CDFS format. What type of evidence is this?

Options:

A.

Data from a CD copied using Windows


B.

Data from a CD copied using Mac-based system


C.

Data from a DVD copied using Windows system


D.

Data from a CD copied using Linux system


Expert Solution
Questions # 139:

What method of copying should always be performed first before carrying out an investigation?

Options:

A.

Parity-bit copy


B.

Bit-stream copy


C.

MS-DOS disc copy


D.

System level copy


Expert Solution
Questions # 140:

When marking evidence that has been collected with the “aaa/ddmmyy/nnnn/zz” format, what does the “nnnn” denote?

Options:

A.

The initials of the forensics analyst


B.

The sequence number for the parts of the same exhibit


C.

The year he evidence was taken


D.

The sequential number of the exhibits seized by the analyst


Expert Solution
Questions # 141:

Madison is on trial for allegedly breaking into her university’s internal network. The police raided her dorm room and seized all of her computer equipment. Madison’s lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison’s lawyer trying to prove the police violated?

Options:

A.

The 4th Amendment


B.

The 1st Amendment


C.

The 10th Amendment


D.

The 5th Amendment


Expert Solution
Questions # 142:

Which of the following is a database in which information about every file and directory on an NT File System (NTFS) volume is stored?

Options:

A.

Volume Boot Record


B.

Master Boot Record


C.

GUID Partition Table


D.

Master File Table


Expert Solution
Questions # 143:

When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are used, where would investigator need to search to find email sent from a Blackberry device?

Options:

A.

RIM Messaging center


B.

Blackberry Enterprise server


C.

Microsoft Exchange server


D.

Blackberry desktop redirector


Expert Solution
Questions # 144:

Which of the following is NOT a part of pre-investigation phase?

Options:

A.

Building forensics workstation


B.

Gathering information about the incident


C.

Gathering evidence data


D.

Creating an investigation team


Expert Solution
Questions # 145:

Where is the startup configuration located on a router?

Options:

A.

Static RAM


B.

BootROM


C.

NVRAM


D.

Dynamic RAM


Expert Solution
Questions # 146:

Shane has started the static analysis of a malware and is using the tool ResourcesExtract to find more details of the malicious program. What part of the analysis is he performing?

Options:

A.

Identifying File Dependencies


B.

Strings search


C.

Dynamic analysis


D.

File obfuscation


Expert Solution
Questions # 147:

What is the location of the binary files required for the functioning of the OS in a Linux system?

Options:

A.

/run


B.

/bin


C.

/root


D.

/sbin


Expert Solution
Questions # 148:

You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

Options:

A.

Network


B.

Transport


C.

Data Link


D.

Session


Expert Solution
Questions # 149:

How often must a company keep log files for them to be admissible in a court of law?

Options:

A.

All log files are admissible in court no matter their frequency


B.

Weekly


C.

Monthly


D.

Continuously


Expert Solution
Questions # 150:

Smith, as a part his forensic investigation assignment, seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data in the mobile device. Smith found that the SIM was protected by a Personal Identification Number (PIN) code, but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He made three unsuccessful attempts, which blocked the SIM card. What can Jason do in this scenario to reset the PIN and access SIM data?

Options:

A.

He should contact the network operator for a Temporary Unlock Code (TUK)


B.

Use system and hardware tools to gain access


C.

He can attempt PIN guesses after 24 hours


D.

He should contact the network operator for Personal Unlock Number (PUK)


Expert Solution
Viewing page 10 out of 15 pages
Viewing questions 136-150 out of questions